Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa. A Model-Based Method for Security Configuration Verification. In Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura, editors, Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings. Volume 4266 of Lecture Notes in Computer Science, pages 60-75, Springer, 2006. [doi]
@inproceedings{SakakiYO06, title = {A Model-Based Method for Security Configuration Verification}, author = {Hiroshi Sakaki and Kazuo Yanoo and Ryuichi Ogawa}, year = {2006}, doi = {10.1007/11908739_5}, url = {http://dx.doi.org/10.1007/11908739_5}, tags = {rule-based, security}, researchr = {https://researchr.org/publication/SakakiYO06}, cites = {0}, citedby = {0}, pages = {60-75}, booktitle = {Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings}, editor = {Hiroshi Yoshiura and Kouichi Sakurai and Kai Rannenberg and Yuko Murayama and Shin-ichi Kawamura}, volume = {4266}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-47699-7}, }